2
Most read
11
Most read
14
Most read
DIGITAL

WATERMARKING
Contents

   What is DWM ?

   Applications

   Classification

   Working

   Attacks

   Advantages and Disadvantages

   Techniques
Digital Watermarking

   We add ‘Visible’ or ‘Invisible’ structure called ‘Watermarks’
    to digital media. The process of adding watermarks is called
    ‘Digital Watermarking’.

   Adaptation of Paper Watermarks.

   Describes methods and technologies that allow to hide/embed
    various types of information to digital document.

   In general Digital Watermarking means “Author Signature”.
Applications

   Copyright Protection

   Owner Identification

   Content Authentification

   Proof of Ownership
Classification

   Perceptible Watermarks and Imperceptible Watermarks

   Robust Watermarks and Fragile Watermarks

   Private Watermarks and Public Watermarks
Classification (contd.)

   Perceptible Watermarks and Imperceptible Watermarks

   Perceptible Watermarks are visible to human eye

   Useful for primary Applications.
       E.g. of watermark in a video
       E.g.. Of watermark in a image

   Imperceptible watermarks are Invisible to human eye.

   Used in the places where the content being watermarked must
    appear in unchanged form.

   Remains hidden in content and can be detected only by authorized
    agencies.
Classification (contd.)

   Robust Watermarks and Fragile Watermarks

   Degree to which watermarks can withstand any modification of any
    type (Accidental or Intentional ).

   Robust Watermarks are difficult to remove from the object in which
    they are embedded.

   Perceptible Watermarks are more Robust.

   Fragile Watermarks can be easily destroyed by any attempt to
    temper with them.
Classification (contd.)

   Private Watermarks and Public Watermarks

   Private Watermark requires at least original data to recover
    watermark.

   They are also known as ‘Secure Watermarks’.

   Public Watermark requires neither original data nor embedded
    watermark to recover watermark information.
Working

   Typical DWM system consists of mainly 3 parts / process

   Watermark Insertion
   Watermark Extraction
   Watermark Detection
A Generic Watermarking System



   Cover Work




                    Watermarked                  Detected
   Watermark                      Watermark
                                                Watermark
   Embedder            Work        Detector
                                                 Message




Watermark Message
User Key
                                         Watermarked
 Input Image      Watermark Insertion
                                            Image

  Watermark


    User Key
                                         Extracted
                  Watermark Extraction
 Watermarked                             Watermark
    Image



    User Key

Watermarked                                Decision
                  Watermark Detection
   Image                                 ( Yes or No )

   Specified ID
 ( Watermark )
General Digital Watermarking Process

(a) Watermark Embedding



                   Digital Watermark
                     0101 …. . . .. . .

 Original Data                            Watermarked Data


                       Embedding
                       Algorithm              0101 …. .

                                                             Distribution
General Digital Watermarking Process (contd.)

(b) Watermark Extraction



                       Original
                        Data

Watermarked Data
                                     Extracted Watermark

                       Extraction
  0101 …. .                            0101 …. . . .. . .
                       Algorithm
Attacks

   Mosaic Attack

   Stir mark Attack

   Geometric Attack
       Subtractive
       Distortive

   Forgery Attack
Attacks (contd.)

Mosaic Attack
Attacks (contd.)

Stirmark
Attacks (contd.)

   Geometric Attack

   Subtractive Attack involves ‘removing’ the mark by cropping or
    digital editing.

   Distortive Attack attempts to make some ‘uniform distortive
    changes’ in the image such that mark becomes ‘unrecognizable’.
Attacks (contd.)

   Forgery Attack

   Also known as ‘Additive Attack’.

   The attacker include his/her own watermark overlaying the original
    image and marking the content as their own.
Advantages

   Uniquely identifies the author of copyrighted work.

   Implementation on PC platform is possible.

   Embedding watermark is easy

   Image Tampering Detection
Disadvantages

   Watermarking doesn’t prevent image copying but we can track
    down and detect ownership of copied images.

   Watermarks vanishes if someone manipulates the image.

   Resizing, compressing images from one file type to another
    may diminish the watermark and it becomes unreadable.
DWM Techniques

   Image Domain Encoding

   Also known as Least Significant Bit (LSB).

   LSB works by reducing the no of colors used by image itself and
    uses the rest of the palette to encode the information.

   If the colors in an image are less then more information can be
    stored without quality loss.
Thank you


 Question ??

More Related Content

PPTX
digital watermarking
PPT
Digital watermarking
PPTX
Digitalwatermarking
PPT
Digital Watermarking
PDF
Report on Digital Watermarking Technology
PPTX
Digital watermarking
PPT
Digital watermarking
PPT
Watermark
digital watermarking
Digital watermarking
Digitalwatermarking
Digital Watermarking
Report on Digital Watermarking Technology
Digital watermarking
Digital watermarking
Watermark

What's hot (20)

PPTX
Chapter1 2
PPT
Digital watermarking
PPTX
Digital watermarking
PPTX
Digital water marking
PPTX
invisible watermarking
PPS
Watermark
DOCX
Digital Watermarking
PPTX
digital watermarking
PPT
Watermarking
PPTX
Digital Watermarking using DWT-SVD
PPTX
digital image processing
PPTX
Digital Image Processing
PPTX
Digital Watermarking Of Medical(DICOM) Images
PPTX
digital steganography
PPT
Watermarking in-imageprocessing
PPTX
Steganography
PPTX
CSE digital Watermarking report
PDF
Image Forgery Detection
PPTX
Watermarking lecture #4
PPT
Steganography presentation
Chapter1 2
Digital watermarking
Digital watermarking
Digital water marking
invisible watermarking
Watermark
Digital Watermarking
digital watermarking
Watermarking
Digital Watermarking using DWT-SVD
digital image processing
Digital Image Processing
Digital Watermarking Of Medical(DICOM) Images
digital steganography
Watermarking in-imageprocessing
Steganography
CSE digital Watermarking report
Image Forgery Detection
Watermarking lecture #4
Steganography presentation
Ad

Viewers also liked (12)

PDF
Video watermarking
PDF
Digital Water Marking For Video Piracy Detection
PPT
Digital image watermarking
PPT
Vidhi's ppt
PPTX
Digital Image Watermarking
PPTX
Final bluejacking
PDF
60 312-318
PPTX
Digital Water marking
PDF
iOS advanced architecture workshop 3h edition
PDF
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
PDF
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
PPT
P 9 Killer Halftone Effect
Video watermarking
Digital Water Marking For Video Piracy Detection
Digital image watermarking
Vidhi's ppt
Digital Image Watermarking
Final bluejacking
60 312-318
Digital Water marking
iOS advanced architecture workshop 3h edition
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
P 9 Killer Halftone Effect
Ad

Similar to Digital Watermarking (20)

PPT
Intro Watermarking
DOCX
Digital watermarking
PPT
DigitalWatermarking.ppt
PPT
Digital Watermarking
PDF
0c96052b28b8e9f1cf000000
PDF
Jq3417501753
PPTX
Presentation
PDF
Image Authentication Using Digital Watermarking
PPTX
Digital watermarking techniques for security applications
PPTX
Image authentication techniques based on Image watermarking
DOC
Technical seminar
PDF
DOCX
Digitalwatermarking
PDF
digitalwatermarking-121202063739-phpapp01.pdf
PDF
1709 1715
PDF
1709 1715
PDF
Digital Image Security using Digital Watermarking
PPTX
Digital Watermarking.pptx
PDF
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
PDF
50120140504020 2
Intro Watermarking
Digital watermarking
DigitalWatermarking.ppt
Digital Watermarking
0c96052b28b8e9f1cf000000
Jq3417501753
Presentation
Image Authentication Using Digital Watermarking
Digital watermarking techniques for security applications
Image authentication techniques based on Image watermarking
Technical seminar
Digitalwatermarking
digitalwatermarking-121202063739-phpapp01.pdf
1709 1715
1709 1715
Digital Image Security using Digital Watermarking
Digital Watermarking.pptx
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
50120140504020 2

Recently uploaded (20)

PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
SaaS reusability assessment using machine learning techniques
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Comparative analysis of machine learning models for fake news detection in so...
PPTX
Internet of Everything -Basic concepts details
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PPTX
Microsoft User Copilot Training Slide Deck
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
Basics of Cloud Computing - Cloud Ecosystem
Advancing precision in air quality forecasting through machine learning integ...
SaaS reusability assessment using machine learning techniques
Improvisation in detection of pomegranate leaf disease using transfer learni...
Connector Corner: Transform Unstructured Documents with Agentic Automation
A symptom-driven medical diagnosis support model based on machine learning te...
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
SGT Report The Beast Plan and Cyberphysical Systems of Control
Auditboard EB SOX Playbook 2023 edition.
Comparative analysis of machine learning models for fake news detection in so...
Internet of Everything -Basic concepts details
LMS bot: enhanced learning management systems for improved student learning e...
EIS-Webinar-Regulated-Industries-2025-08.pdf
Microsoft User Copilot Training Slide Deck
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC

Digital Watermarking

  • 2. Contents  What is DWM ?  Applications  Classification  Working  Attacks  Advantages and Disadvantages  Techniques
  • 3. Digital Watermarking  We add ‘Visible’ or ‘Invisible’ structure called ‘Watermarks’ to digital media. The process of adding watermarks is called ‘Digital Watermarking’.  Adaptation of Paper Watermarks.  Describes methods and technologies that allow to hide/embed various types of information to digital document.  In general Digital Watermarking means “Author Signature”.
  • 4. Applications  Copyright Protection  Owner Identification  Content Authentification  Proof of Ownership
  • 5. Classification  Perceptible Watermarks and Imperceptible Watermarks  Robust Watermarks and Fragile Watermarks  Private Watermarks and Public Watermarks
  • 6. Classification (contd.)  Perceptible Watermarks and Imperceptible Watermarks  Perceptible Watermarks are visible to human eye  Useful for primary Applications. E.g. of watermark in a video E.g.. Of watermark in a image  Imperceptible watermarks are Invisible to human eye.  Used in the places where the content being watermarked must appear in unchanged form.  Remains hidden in content and can be detected only by authorized agencies.
  • 7. Classification (contd.)  Robust Watermarks and Fragile Watermarks  Degree to which watermarks can withstand any modification of any type (Accidental or Intentional ).  Robust Watermarks are difficult to remove from the object in which they are embedded.  Perceptible Watermarks are more Robust.  Fragile Watermarks can be easily destroyed by any attempt to temper with them.
  • 8. Classification (contd.)  Private Watermarks and Public Watermarks  Private Watermark requires at least original data to recover watermark.  They are also known as ‘Secure Watermarks’.  Public Watermark requires neither original data nor embedded watermark to recover watermark information.
  • 9. Working  Typical DWM system consists of mainly 3 parts / process  Watermark Insertion  Watermark Extraction  Watermark Detection
  • 10. A Generic Watermarking System Cover Work Watermarked Detected Watermark Watermark Watermark Embedder Work Detector Message Watermark Message
  • 11. User Key Watermarked Input Image Watermark Insertion Image Watermark User Key Extracted Watermark Extraction Watermarked Watermark Image User Key Watermarked Decision Watermark Detection Image ( Yes or No ) Specified ID ( Watermark )
  • 12. General Digital Watermarking Process (a) Watermark Embedding Digital Watermark 0101 …. . . .. . . Original Data Watermarked Data Embedding Algorithm 0101 …. . Distribution
  • 13. General Digital Watermarking Process (contd.) (b) Watermark Extraction Original Data Watermarked Data Extracted Watermark Extraction 0101 …. . 0101 …. . . .. . . Algorithm
  • 14. Attacks  Mosaic Attack  Stir mark Attack  Geometric Attack  Subtractive  Distortive  Forgery Attack
  • 17. Attacks (contd.)  Geometric Attack  Subtractive Attack involves ‘removing’ the mark by cropping or digital editing.  Distortive Attack attempts to make some ‘uniform distortive changes’ in the image such that mark becomes ‘unrecognizable’.
  • 18. Attacks (contd.)  Forgery Attack  Also known as ‘Additive Attack’.  The attacker include his/her own watermark overlaying the original image and marking the content as their own.
  • 19. Advantages  Uniquely identifies the author of copyrighted work.  Implementation on PC platform is possible.  Embedding watermark is easy  Image Tampering Detection
  • 20. Disadvantages  Watermarking doesn’t prevent image copying but we can track down and detect ownership of copied images.  Watermarks vanishes if someone manipulates the image.  Resizing, compressing images from one file type to another may diminish the watermark and it becomes unreadable.
  • 21. DWM Techniques  Image Domain Encoding  Also known as Least Significant Bit (LSB).  LSB works by reducing the no of colors used by image itself and uses the rest of the palette to encode the information.  If the colors in an image are less then more information can be stored without quality loss.